Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Real-Time Spammers Detection Based on Metadata Features with Machine Learning

    Adnan Ali1, Jinlong Li1, Huanhuan Chen1, Uzair Aslam Bhatti2, Asad Khan3,*

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 241-258, 2023, DOI:10.32604/iasc.2023.041645

    Abstract Spammer detection is to identify and block malicious activities performing users. Such users should be identified and terminated from social media to keep the social media process organic and to maintain the integrity of online social spaces. Previous research aimed to find spammers based on hybrid approaches of graph mining, posted content, and metadata, using small and manually labeled datasets. However, such hybrid approaches are unscalable, not robust, particular dataset dependent, and require numerous parameters, complex graphs, and natural language processing (NLP) resources to make decisions, which makes spammer detection impractical for real-time detection. For example, graph mining requires neighbors’… More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used in the inquiry. This research… More >

  • Open Access

    ARTICLE

    Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions

    Ibrahim M. Alwayle1, Badriyya B. Al-onazi2, Mohamed K. Nour3, Khaled M. Alalayah1, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed4, Amal S. Mehanna5, Abdelwahed Motwakel6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2947-2961, 2023, DOI:10.32604/csse.2023.034456

    Abstract Online reviews regarding purchasing services or products offered are the main source of users’ opinions. To gain fame or profit, generally, spam reviews are written to demote or promote certain targeted products or services. This practice is called review spamming. During the last few years, various techniques have been recommended to solve the problem of spam reviews. Previous spam detection study focuses on English reviews, with a lesser interest in other languages. Spam review detection in Arabic online sources is an innovative topic despite the vast amount of data produced. Thus, this study develops an Automated Spam Review Detection using… More >

  • Open Access

    ARTICLE

    Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models

    Sujithra Kanmani*, Surendiran Balasubramanian

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1439-1454, 2023, DOI:10.32604/csse.2023.029953

    Abstract Online reviews significantly influence decision-making in many aspects of society. The integrity of internet evaluations is crucial for both consumers and vendors. This concern necessitates the development of effective fake review detection techniques. The goal of this study is to identify fraudulent text reviews. A comparison is made on shill reviews vs. genuine reviews over sentiment and readability features using semi-supervised language processing methods with a labeled and balanced Deceptive Opinion dataset. We analyze textual features accessible in internet reviews by merging sentiment mining approaches with readability. Overall, the research improves fake review screening by using various transformer models such… More >

  • Open Access

    ARTICLE

    Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2641-2659, 2023, DOI:10.32604/cmc.2023.028796

    Abstract Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques:… More >

  • Open Access

    ARTICLE

    New Spam Filtering Method with Hadoop Tuning-Based MapReduce Naïve Bayes

    Keungyeup Ji, Youngmi Kwon*

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 201-214, 2023, DOI:10.32604/csse.2023.031270

    Abstract As the importance of email increases, the amount of malicious email is also increasing, so the need for malicious email filtering is growing. Since it is more economical to combine commodity hardware consisting of a medium server or PC with a virtual environment to use as a single server resource and filter malicious email using machine learning techniques, we used a Hadoop MapReduce framework and Naïve Bayes among machine learning methods for malicious email filtering. Naïve Bayes was selected because it is one of the top machine learning methods(Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor(KNN), and Decision Tree) in… More >

  • Open Access

    ARTICLE

    Email Filtering Using Hybrid Feature Selection Model

    Adel Hamdan Mohammad1,* , Sami Smadi2, Tariq Alwada’n3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 435-450, 2022, DOI:10.32604/cmes.2022.020088

    Abstract Undoubtedly, spam is a serious problem, and the number of spam emails is increased rapidly. Besides, the massive number of spam emails prompts the need for spam detection techniques. Several methods and algorithms are used for spam filtering. Also, some emergent spam detection techniques use machine learning methods and feature extraction. Some methods and algorithms have been introduced for spam detecting and filtering. This research proposes two models for spam detection and feature selection. The first model is evaluated with the email spam classification dataset, which is based on reducing the number of keywords to its minimum. The results of… More >

  • Open Access

    ARTICLE

    E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks

    Sanaa A. A. Ghaleb1,3,4, Mumtazimah Mohamad1, Syed Abdullah Fadzli1, Waheed A.H.M. Ghanem2,3,4,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4749-4766, 2022, DOI:10.32604/cmc.2022.020472

    Abstract Spam has turned into a big predicament these days, due to the increase in the number of spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting users’ time and bandwidth. In addition, it limits the storage space of the email box as well as the disk space. Thus, spam detection is a challenge for individuals and organizations alike. To advance spam email detection, this work proposes a new spam detection approach, using the grasshopper optimization algorithm (GOA) in training a multilayer perceptron (MLP) classifier for categorizing emails as ham and spam. Hence, MLP and… More >

  • Open Access

    ARTICLE

    Pseudo NLP Joint Spam Classification Technique for Big Data Cluster

    WooHyun Park1, Nawab Muhammad Faseeh Qureshi2,*, Dong Ryeol Shin1

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 517-535, 2022, DOI:10.32604/cmc.2022.021421

    Abstract Spam mail classification considered complex and error-prone task in the distributed computing environment. There are various available spam mail classification approaches such as the naive Bayesian classifier, logistic regression and support vector machine and decision tree, recursive neural network, and long short-term memory algorithms. However, they do not consider the document when analyzing spam mail content. These approaches use the bag-of-words method, which analyzes a large amount of text data and classifies features with the help of term frequency-inverse document frequency. Because there are many words in a document, these approaches consume a massive amount of resources and become infeasible… More >

  • Open Access

    ARTICLE

    Stochastic Gradient Boosting Model for Twitter Spam Detection

    K. Kiruthika Devi1,*, G. A. Sathish Kumar2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 849-859, 2022, DOI:10.32604/csse.2022.020836

    Abstract

    In today’s world of connectivity there is a huge amount of data than we could imagine. The number of network users are increasing day by day and there are large number of social networks which keeps the users connected all the time. These social networks give the complete independence to the user to post the data either political, commercial or entertainment value. Some data may be sensitive and have a greater impact on the society as a result. The trustworthiness of data is important when it comes to public social networking sites like facebook and twitter. Due to the large… More >

Displaying 1-10 on page 1 of 15. Per Page